On 04.10.2025 00:53, Andrew Cooper wrote: > Under FRED, entry_from_pv() handles everything, even system calls. This means > more of our logic is written in C now, rather than assembly. > > In order to facilitate this, introduce pv_inject_callback(), which reuses > struct trap_bounce infrastructure to inject the syscall/sysenter callbacks. > This in turns requires some !PV compatibility for pv_inject_callback() and > pv_hypercall() which can both be ASSERT_UNREACHABLE(). > > For each of INT $N, SYSCALL and SYSENTER, FRED gives us interrupted context > which was previously lost. As the guest can't see FRED, Xen has to lose state > in the same way to maintain the prior behaviour. > > Signed-off-by: Andrew Cooper <[email protected]>
Reviewed-by: Jan Beulich <[email protected]>
